SlideShare a Scribd company logo
How To Protect From Malware
Safe At Work And At Home
by Infonautics GmbH www.infonautics.ch
Virus
Virus
A computer virus is a malicious software program which can infect files,
software and data carriers. Once activated, the computer virus can make
modifications to hardware, operating system and software without your
knowledge.
Caution:
• of email attachments of any kind
• when installing software, especially from dubious sources
• when copying data from storage media (e.g., USB stick) of
unknown or unchecked sources
• when downloading files of dubious sources
Worm
Worm
In contrast to the computer virus, the computer worm spreads
independently. Its goal is to reproduce and spread as quickly as possible.
For example a computer worm is able to read address books and dispatch
bulk emails independently.
Caution:
• of email attachments of any kind
• of security vulnerabilities in the operating system, programs,
network and Internet connections
• when copying data from storage media (e.g., USB stick) of
unknown or unchecked sources
• when downloading files of dubious sources
Trojan
Trojan
Usually, a trojan comes as a pretended useful application, in order to carry
out unnoticed additional malicious functions and thus to transmit sensitive
data such as passwords, credit card numbers and e-banking information
etc. to cyber criminals.
Caution:
• of email attachments of any kind
• when installing software of unkown sources
• when downloading files of dubious sources
• when visiting questionable websites
• of broswer plugins
Scareware
Scareware
Scareware makes the user believe that there is a problem with the
computer and a supposedly useful software has immediately to be
downloaded and installed in order to solve the problem.
Caution:
• of sudden warning messages that appear on your desktop
or as pop-ups in the browser
• if you are prompted to download immediately a specific
software
Ransomware
Ransomware
Ransomware, also called blackmail Trojan, infects your computer with the
intention to encrypt most important data and release it only by your paying
a ransom.
Caution:
• of email attachments of any kind
• when using file-shareing sites
• when downloading files of dubious sources
• of links in Facebook messages
• when visiting questionable websites
Spyware
Spyware
Spyware, also called spy software, is used to track down people's identity
without their knowledge. In order to gain access to this data the spyware is
reading keyboard inputs and recording screen views.
Caution:
• with supposedly „free“ software
• when downloading files of dubious sources
• when visitiong questionable websites
Adware
Adware
As the name suggests (ad = advertising), adware is regularly displaying
unsolicited advertisements as pop-ups.
Caution:
• of email attachments of any kind
• when clicking on pop-up ads
• when downloading free software on questionable sites
• when visiting misleading / untrustworthy websites
Phishing
Phishing
The goal of phishing is the theft of sensitive data, such as bank account
login data and credit card numbers, e-mail accounts and social media
accounts based on fake emails, bogus websites or short messages.
Caution:
• if prompted to specify login data such as password and user
ID - Never execute!
• of inconsistent emails (false sender, wrong web address
(URL) - Do not react!
How To Protect Yourself From Malware
In principle, there are two important aspects to protect
against malware. On one hand, there is valuable and
important software available which can protect us
against "invaders" on our computers. On the other hand,
human beings themselves are a central factor. Our
behavior, what we do or do not, is a major contributor to
protecting us from malicious software.
How To Protect Yourself From Malware
• Anitvirus Software: An antivirus software on your computer is an
absolute prerequisite to protect yourself against viruses and worms.
• Firewall: The firewall is the "protective barrier" of unwanted access to
your computer via Internet.
• Install an Ad Blocker on your web browser.This protects against the
execution of unwanted scripts.
Technical Aspects
This software must be installed on your computer:
How To Protect Yourself From Malware
• Have a healthy scepticism about email attachements from unkown
sources. Never open email attachments from unknown sources.
• Be careful when clicking on links in email messages from unknown
senders. Signs of possible untrustworthy emails are: no reasonable
subject line and no verifiable content, or only attachments without mail
content.
• Download software from trusted sources only.
• Ignore urgent installation prompts on the Web.
• Never disclose personal information.
• If possible, do not log on to the system with administrator rights for
normal work.
• Update regularly the operating system and installed programs.
Personal Aspects
Consider the following for malware protection:
How To Protect Yourself From Malware
Distinguish between a complete system backup and backup of your
working files.
The system backup can be carried out once a week and after significant
changes.A 1: 1 image backup of the complete hard disk (including
programs and data) to an external data carrier is recommended.This also
protects from a possible technical failure of a hard disk.
The backup of the working files should take place daily , or better still,
should be automatically running in the background. As for example with
the backup software Live File Backup for Windows. Download here the
free trial version: www.livefilebackup.com
Data Backup
And last but not least, perform backups regularly:
Live File Backup For Windows
Automatically running data backup in
the background.
Download now free trial version!
www.livefilebackup.com
Imprint
Developed by INFONAUTICS GmbH
Eichholzweg 16
6312 Steinhausen
Schweiz
www.infonautics.ch
Author Anita Wirz
Picture Source Pixabay

More Related Content

What's hot

Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
amiable_indian
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Jatin Kumar
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
Ppt123
Ppt123Ppt123
Ppt123
Faiz Khan
 
Ransomware
Ransomware Ransomware
Ransomware
Armor
 
Antivirus
AntivirusAntivirus
Antivirus
ava & araf co.
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
Shreya Singireddy
 
Ransomware
RansomwareRansomware
Ransomware
Chaitali Sharma
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
IkramSabir4
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
Napier University
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
SanishShrestha2
 
Computer virus
Computer virusComputer virus
Computer virus
Maxie Santos
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
Aasim Mushtaq
 

What's hot (20)

Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
MALWARE
MALWAREMALWARE
MALWARE
 
Ppt123
Ppt123Ppt123
Ppt123
 
Ransomware
Ransomware Ransomware
Ransomware
 
Antivirus
AntivirusAntivirus
Antivirus
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Ransomware
RansomwareRansomware
Ransomware
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 
Computer virus
Computer virusComputer virus
Computer virus
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 

Viewers also liked

Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
Arpit Mittal
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
daniyalqureshi712
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
Pace IT at Edmonds Community College
 
Computer malware anti malware coevolution
Computer malware anti malware coevolution Computer malware anti malware coevolution
Computer malware anti malware coevolution
Himanshu Dubey
 
Training Intelligence: Secrets and Tips for Successful Learning Partnerships ...
Training Intelligence: Secrets and Tips for Successful Learning Partnerships ...Training Intelligence: Secrets and Tips for Successful Learning Partnerships ...
Training Intelligence: Secrets and Tips for Successful Learning Partnerships ...
The HR Observer
 
Engagement Through Learning and Development – A Practical Case Study
Engagement Through Learning and Development – A Practical Case StudyEngagement Through Learning and Development – A Practical Case Study
Engagement Through Learning and Development – A Practical Case Study
The HR Observer
 
Death of appraisal - Webinar
Death of appraisal - WebinarDeath of appraisal - Webinar
Death of appraisal - Webinar
The HR Observer
 
Employing Workforce Analytics to Measure and Drive Engagement
Employing Workforce Analytics to Measure and Drive EngagementEmploying Workforce Analytics to Measure and Drive Engagement
Employing Workforce Analytics to Measure and Drive Engagement
The HR Observer
 
Erfolgreich eine Mitarbeiterbefragung durchführen
Erfolgreich eine Mitarbeiterbefragung durchführenErfolgreich eine Mitarbeiterbefragung durchführen
Erfolgreich eine Mitarbeiterbefragung durchführen
INFONAUTICS GmbH
 
Webinar: Defend Your Training Budget
Webinar: Defend Your Training BudgetWebinar: Defend Your Training Budget
Webinar: Defend Your Training Budget
The HR Observer
 
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
Digiday
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
anthnyq
 
Malware
MalwareMalware
Malware
fovi96
 
How to protect pc against Malware
How to protect pc against MalwareHow to protect pc against Malware
How to protect pc against Malware
jackadision
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware
Sanyog Chandra
 
Study Skills, Notetaking and Technology
Study Skills, Notetaking and TechnologyStudy Skills, Notetaking and Technology
Study Skills, Notetaking and Technology
aaberra
 
Fragebogen erstellen - So kommen Sie ans Ziel!
Fragebogen erstellen - So kommen Sie ans Ziel!Fragebogen erstellen - So kommen Sie ans Ziel!
Fragebogen erstellen - So kommen Sie ans Ziel!
INFONAUTICS GmbH
 
How hr can get a seat on the board
How hr can get a seat on the boardHow hr can get a seat on the board
How hr can get a seat on the board
The HR Observer
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
OPSWAT
 

Viewers also liked (20)

Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Computer malware anti malware coevolution
Computer malware anti malware coevolution Computer malware anti malware coevolution
Computer malware anti malware coevolution
 
Training Intelligence: Secrets and Tips for Successful Learning Partnerships ...
Training Intelligence: Secrets and Tips for Successful Learning Partnerships ...Training Intelligence: Secrets and Tips for Successful Learning Partnerships ...
Training Intelligence: Secrets and Tips for Successful Learning Partnerships ...
 
Engagement Through Learning and Development – A Practical Case Study
Engagement Through Learning and Development – A Practical Case StudyEngagement Through Learning and Development – A Practical Case Study
Engagement Through Learning and Development – A Practical Case Study
 
Death of appraisal - Webinar
Death of appraisal - WebinarDeath of appraisal - Webinar
Death of appraisal - Webinar
 
Employing Workforce Analytics to Measure and Drive Engagement
Employing Workforce Analytics to Measure and Drive EngagementEmploying Workforce Analytics to Measure and Drive Engagement
Employing Workforce Analytics to Measure and Drive Engagement
 
Website images
Website imagesWebsite images
Website images
 
Erfolgreich eine Mitarbeiterbefragung durchführen
Erfolgreich eine Mitarbeiterbefragung durchführenErfolgreich eine Mitarbeiterbefragung durchführen
Erfolgreich eine Mitarbeiterbefragung durchführen
 
Webinar: Defend Your Training Budget
Webinar: Defend Your Training BudgetWebinar: Defend Your Training Budget
Webinar: Defend Your Training Budget
 
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
Malware
MalwareMalware
Malware
 
How to protect pc against Malware
How to protect pc against MalwareHow to protect pc against Malware
How to protect pc against Malware
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware
 
Study Skills, Notetaking and Technology
Study Skills, Notetaking and TechnologyStudy Skills, Notetaking and Technology
Study Skills, Notetaking and Technology
 
Fragebogen erstellen - So kommen Sie ans Ziel!
Fragebogen erstellen - So kommen Sie ans Ziel!Fragebogen erstellen - So kommen Sie ans Ziel!
Fragebogen erstellen - So kommen Sie ans Ziel!
 
How hr can get a seat on the board
How hr can get a seat on the boardHow hr can get a seat on the board
How hr can get a seat on the board
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 

Similar to How To Protect From Malware

anti_virus
anti_virusanti_virus
anti_virus
sharq university
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
Zara Nawaz
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
METU-Informatics
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
Sarhad Baez
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
wardjo
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
Dharmesh Kumar Sharma
 
Virus
VirusVirus
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
Bipulok
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
Frank Victory
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threat
Azri Abdin
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
Azri Abdin
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
Online Safety - Malwares
Online Safety - MalwaresOnline Safety - Malwares
Online Safety - Malwares
Arnav Kumar
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
Mahamudul Hassan Niaz
 
Computer security
Computer securityComputer security
Computer security
Robin E. Beavers
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
JoelGautham
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
Progressive Integrations
 

Similar to How To Protect From Malware (20)

anti_virus
anti_virusanti_virus
anti_virus
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Virus
VirusVirus
Virus
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
 
Internet security
Internet securityInternet security
Internet security
 
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threat
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Online Safety - Malwares
Online Safety - MalwaresOnline Safety - Malwares
Online Safety - Malwares
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer security
Computer securityComputer security
Computer security
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Malicious
MaliciousMalicious
Malicious
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 

Recently uploaded

AI - Your Startup Sidekick (Leveraging AI to Bootstrap a Lean Startup).pdf
AI - Your Startup Sidekick (Leveraging AI to Bootstrap a Lean Startup).pdfAI - Your Startup Sidekick (Leveraging AI to Bootstrap a Lean Startup).pdf
AI - Your Startup Sidekick (Leveraging AI to Bootstrap a Lean Startup).pdf
Daniel Zivkovic
 
Applitools Autonomous 2.0 Sneak Peek.pdf
Applitools Autonomous 2.0 Sneak Peek.pdfApplitools Autonomous 2.0 Sneak Peek.pdf
Applitools Autonomous 2.0 Sneak Peek.pdf
Applitools
 
SEO Cheat Sheet with Learning Resources by Balti Bloggers.pdf
SEO Cheat Sheet with Learning Resources by Balti Bloggers.pdfSEO Cheat Sheet with Learning Resources by Balti Bloggers.pdf
SEO Cheat Sheet with Learning Resources by Balti Bloggers.pdf
Balti Bloggers
 
Private Girls Call Navi Mumbai 🛵🚡9820252231 💃 Choose Best And Top Girl Servic...
Private Girls Call Navi Mumbai 🛵🚡9820252231 💃 Choose Best And Top Girl Servic...Private Girls Call Navi Mumbai 🛵🚡9820252231 💃 Choose Best And Top Girl Servic...
Private Girls Call Navi Mumbai 🛵🚡9820252231 💃 Choose Best And Top Girl Servic...
902basic
 
Independent Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class H...
Independent Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class H...Independent Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class H...
Independent Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class H...
aslasdfmkhan4750
 
Tour and travel website management in odoo,
Tour and travel website management in odoo,Tour and travel website management in odoo,
Tour and travel website management in odoo,
Axis Technolabs
 
SAP implementation steps PDF - Zyple Software
SAP implementation steps PDF - Zyple SoftwareSAP implementation steps PDF - Zyple Software
SAP implementation steps PDF - Zyple Software
Zyple Software
 
Amadeus Travel API, Amadeus Booking API, Amadeus GDS
Amadeus Travel API, Amadeus Booking API, Amadeus GDSAmadeus Travel API, Amadeus Booking API, Amadeus GDS
Amadeus Travel API, Amadeus Booking API, Amadeus GDS
aadhiyaeliza
 
Odoo E-commerce website development guides
Odoo E-commerce website development guidesOdoo E-commerce website development guides
Odoo E-commerce website development guides
jhkdigitalmarketing
 
🚂🚘 Premium Girls Call Ranchi 🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
🚂🚘 Premium Girls Call Ranchi  🛵🚡000XX00000 💃 Choose Best And Top Girl Service...🚂🚘 Premium Girls Call Ranchi  🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
🚂🚘 Premium Girls Call Ranchi 🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
bahubalikumar09988
 
Celebrity Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service A...
Celebrity Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service A...Celebrity Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service A...
Celebrity Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service A...
norina2645
 
Fantastic Design Patterns and Where to use them No Notes.pdf
Fantastic Design Patterns and Where to use them No Notes.pdfFantastic Design Patterns and Where to use them No Notes.pdf
Fantastic Design Patterns and Where to use them No Notes.pdf
6m9p7qnjj8
 
How To Fill Timesheet in TaskSprint: Quick Guide 2024
How To Fill Timesheet in TaskSprint: Quick Guide 2024How To Fill Timesheet in TaskSprint: Quick Guide 2024
How To Fill Timesheet in TaskSprint: Quick Guide 2024
TaskSprint | Employee Efficiency Software
 
Girls Call Jogeshwari 9967584737 Provide Best And Top Girl Service And No1 in...
Girls Call Jogeshwari 9967584737 Provide Best And Top Girl Service And No1 in...Girls Call Jogeshwari 9967584737 Provide Best And Top Girl Service And No1 in...
Girls Call Jogeshwari 9967584737 Provide Best And Top Girl Service And No1 in...
simran hot girls
 
Celebrity Girls Call Mumbai 9930687706 Unlimited Short Providing Girls Servic...
Celebrity Girls Call Mumbai 9930687706 Unlimited Short Providing Girls Servic...Celebrity Girls Call Mumbai 9930687706 Unlimited Short Providing Girls Servic...
Celebrity Girls Call Mumbai 9930687706 Unlimited Short Providing Girls Servic...
kiara pandey
 
Russian Girls Call Mumbai 🛵🚡9833363713 💃 Choose Best And Top Girl Service And...
Russian Girls Call Mumbai 🛵🚡9833363713 💃 Choose Best And Top Girl Service And...Russian Girls Call Mumbai 🛵🚡9833363713 💃 Choose Best And Top Girl Service And...
Russian Girls Call Mumbai 🛵🚡9833363713 💃 Choose Best And Top Girl Service And...
dream girl
 
PathSpotter: Exploring Tested Paths to Discover Missing Tests (FSE 2024)
PathSpotter: Exploring Tested Paths to Discover Missing Tests (FSE 2024)PathSpotter: Exploring Tested Paths to Discover Missing Tests (FSE 2024)
PathSpotter: Exploring Tested Paths to Discover Missing Tests (FSE 2024)
andrehoraa
 
Il Data Streaming per un’AI real-time di nuova generazione
Il Data Streaming per un’AI real-time di nuova generazioneIl Data Streaming per un’AI real-time di nuova generazione
Il Data Streaming per un’AI real-time di nuova generazione
confluent
 
VVIP Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
VVIP Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...VVIP Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
VVIP Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
jealousviolet
 
bangalore Girls call 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
bangalore Girls call  👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Deliverybangalore Girls call  👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
bangalore Girls call 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
sunilverma7884
 

Recently uploaded (20)

AI - Your Startup Sidekick (Leveraging AI to Bootstrap a Lean Startup).pdf
AI - Your Startup Sidekick (Leveraging AI to Bootstrap a Lean Startup).pdfAI - Your Startup Sidekick (Leveraging AI to Bootstrap a Lean Startup).pdf
AI - Your Startup Sidekick (Leveraging AI to Bootstrap a Lean Startup).pdf
 
Applitools Autonomous 2.0 Sneak Peek.pdf
Applitools Autonomous 2.0 Sneak Peek.pdfApplitools Autonomous 2.0 Sneak Peek.pdf
Applitools Autonomous 2.0 Sneak Peek.pdf
 
SEO Cheat Sheet with Learning Resources by Balti Bloggers.pdf
SEO Cheat Sheet with Learning Resources by Balti Bloggers.pdfSEO Cheat Sheet with Learning Resources by Balti Bloggers.pdf
SEO Cheat Sheet with Learning Resources by Balti Bloggers.pdf
 
Private Girls Call Navi Mumbai 🛵🚡9820252231 💃 Choose Best And Top Girl Servic...
Private Girls Call Navi Mumbai 🛵🚡9820252231 💃 Choose Best And Top Girl Servic...Private Girls Call Navi Mumbai 🛵🚡9820252231 💃 Choose Best And Top Girl Servic...
Private Girls Call Navi Mumbai 🛵🚡9820252231 💃 Choose Best And Top Girl Servic...
 
Independent Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class H...
Independent Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class H...Independent Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class H...
Independent Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class H...
 
Tour and travel website management in odoo,
Tour and travel website management in odoo,Tour and travel website management in odoo,
Tour and travel website management in odoo,
 
SAP implementation steps PDF - Zyple Software
SAP implementation steps PDF - Zyple SoftwareSAP implementation steps PDF - Zyple Software
SAP implementation steps PDF - Zyple Software
 
Amadeus Travel API, Amadeus Booking API, Amadeus GDS
Amadeus Travel API, Amadeus Booking API, Amadeus GDSAmadeus Travel API, Amadeus Booking API, Amadeus GDS
Amadeus Travel API, Amadeus Booking API, Amadeus GDS
 
Odoo E-commerce website development guides
Odoo E-commerce website development guidesOdoo E-commerce website development guides
Odoo E-commerce website development guides
 
🚂🚘 Premium Girls Call Ranchi 🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
🚂🚘 Premium Girls Call Ranchi  🛵🚡000XX00000 💃 Choose Best And Top Girl Service...🚂🚘 Premium Girls Call Ranchi  🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
🚂🚘 Premium Girls Call Ranchi 🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
 
Celebrity Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service A...
Celebrity Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service A...Celebrity Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service A...
Celebrity Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service A...
 
Fantastic Design Patterns and Where to use them No Notes.pdf
Fantastic Design Patterns and Where to use them No Notes.pdfFantastic Design Patterns and Where to use them No Notes.pdf
Fantastic Design Patterns and Where to use them No Notes.pdf
 
How To Fill Timesheet in TaskSprint: Quick Guide 2024
How To Fill Timesheet in TaskSprint: Quick Guide 2024How To Fill Timesheet in TaskSprint: Quick Guide 2024
How To Fill Timesheet in TaskSprint: Quick Guide 2024
 
Girls Call Jogeshwari 9967584737 Provide Best And Top Girl Service And No1 in...
Girls Call Jogeshwari 9967584737 Provide Best And Top Girl Service And No1 in...Girls Call Jogeshwari 9967584737 Provide Best And Top Girl Service And No1 in...
Girls Call Jogeshwari 9967584737 Provide Best And Top Girl Service And No1 in...
 
Celebrity Girls Call Mumbai 9930687706 Unlimited Short Providing Girls Servic...
Celebrity Girls Call Mumbai 9930687706 Unlimited Short Providing Girls Servic...Celebrity Girls Call Mumbai 9930687706 Unlimited Short Providing Girls Servic...
Celebrity Girls Call Mumbai 9930687706 Unlimited Short Providing Girls Servic...
 
Russian Girls Call Mumbai 🛵🚡9833363713 💃 Choose Best And Top Girl Service And...
Russian Girls Call Mumbai 🛵🚡9833363713 💃 Choose Best And Top Girl Service And...Russian Girls Call Mumbai 🛵🚡9833363713 💃 Choose Best And Top Girl Service And...
Russian Girls Call Mumbai 🛵🚡9833363713 💃 Choose Best And Top Girl Service And...
 
PathSpotter: Exploring Tested Paths to Discover Missing Tests (FSE 2024)
PathSpotter: Exploring Tested Paths to Discover Missing Tests (FSE 2024)PathSpotter: Exploring Tested Paths to Discover Missing Tests (FSE 2024)
PathSpotter: Exploring Tested Paths to Discover Missing Tests (FSE 2024)
 
Il Data Streaming per un’AI real-time di nuova generazione
Il Data Streaming per un’AI real-time di nuova generazioneIl Data Streaming per un’AI real-time di nuova generazione
Il Data Streaming per un’AI real-time di nuova generazione
 
VVIP Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
VVIP Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...VVIP Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
VVIP Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
 
bangalore Girls call 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
bangalore Girls call  👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Deliverybangalore Girls call  👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
bangalore Girls call 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
 

How To Protect From Malware

  • 1. How To Protect From Malware Safe At Work And At Home by Infonautics GmbH www.infonautics.ch
  • 3. Virus A computer virus is a malicious software program which can infect files, software and data carriers. Once activated, the computer virus can make modifications to hardware, operating system and software without your knowledge. Caution: • of email attachments of any kind • when installing software, especially from dubious sources • when copying data from storage media (e.g., USB stick) of unknown or unchecked sources • when downloading files of dubious sources
  • 5. Worm In contrast to the computer virus, the computer worm spreads independently. Its goal is to reproduce and spread as quickly as possible. For example a computer worm is able to read address books and dispatch bulk emails independently. Caution: • of email attachments of any kind • of security vulnerabilities in the operating system, programs, network and Internet connections • when copying data from storage media (e.g., USB stick) of unknown or unchecked sources • when downloading files of dubious sources
  • 7. Trojan Usually, a trojan comes as a pretended useful application, in order to carry out unnoticed additional malicious functions and thus to transmit sensitive data such as passwords, credit card numbers and e-banking information etc. to cyber criminals. Caution: • of email attachments of any kind • when installing software of unkown sources • when downloading files of dubious sources • when visiting questionable websites • of broswer plugins
  • 9. Scareware Scareware makes the user believe that there is a problem with the computer and a supposedly useful software has immediately to be downloaded and installed in order to solve the problem. Caution: • of sudden warning messages that appear on your desktop or as pop-ups in the browser • if you are prompted to download immediately a specific software
  • 11. Ransomware Ransomware, also called blackmail Trojan, infects your computer with the intention to encrypt most important data and release it only by your paying a ransom. Caution: • of email attachments of any kind • when using file-shareing sites • when downloading files of dubious sources • of links in Facebook messages • when visiting questionable websites
  • 13. Spyware Spyware, also called spy software, is used to track down people's identity without their knowledge. In order to gain access to this data the spyware is reading keyboard inputs and recording screen views. Caution: • with supposedly „free“ software • when downloading files of dubious sources • when visitiong questionable websites
  • 15. Adware As the name suggests (ad = advertising), adware is regularly displaying unsolicited advertisements as pop-ups. Caution: • of email attachments of any kind • when clicking on pop-up ads • when downloading free software on questionable sites • when visiting misleading / untrustworthy websites
  • 17. Phishing The goal of phishing is the theft of sensitive data, such as bank account login data and credit card numbers, e-mail accounts and social media accounts based on fake emails, bogus websites or short messages. Caution: • if prompted to specify login data such as password and user ID - Never execute! • of inconsistent emails (false sender, wrong web address (URL) - Do not react!
  • 18. How To Protect Yourself From Malware In principle, there are two important aspects to protect against malware. On one hand, there is valuable and important software available which can protect us against "invaders" on our computers. On the other hand, human beings themselves are a central factor. Our behavior, what we do or do not, is a major contributor to protecting us from malicious software.
  • 19. How To Protect Yourself From Malware • Anitvirus Software: An antivirus software on your computer is an absolute prerequisite to protect yourself against viruses and worms. • Firewall: The firewall is the "protective barrier" of unwanted access to your computer via Internet. • Install an Ad Blocker on your web browser.This protects against the execution of unwanted scripts. Technical Aspects This software must be installed on your computer:
  • 20. How To Protect Yourself From Malware • Have a healthy scepticism about email attachements from unkown sources. Never open email attachments from unknown sources. • Be careful when clicking on links in email messages from unknown senders. Signs of possible untrustworthy emails are: no reasonable subject line and no verifiable content, or only attachments without mail content. • Download software from trusted sources only. • Ignore urgent installation prompts on the Web. • Never disclose personal information. • If possible, do not log on to the system with administrator rights for normal work. • Update regularly the operating system and installed programs. Personal Aspects Consider the following for malware protection:
  • 21. How To Protect Yourself From Malware Distinguish between a complete system backup and backup of your working files. The system backup can be carried out once a week and after significant changes.A 1: 1 image backup of the complete hard disk (including programs and data) to an external data carrier is recommended.This also protects from a possible technical failure of a hard disk. The backup of the working files should take place daily , or better still, should be automatically running in the background. As for example with the backup software Live File Backup for Windows. Download here the free trial version: www.livefilebackup.com Data Backup And last but not least, perform backups regularly:
  • 22. Live File Backup For Windows Automatically running data backup in the background. Download now free trial version! www.livefilebackup.com
  • 23. Imprint Developed by INFONAUTICS GmbH Eichholzweg 16 6312 Steinhausen Schweiz www.infonautics.ch Author Anita Wirz Picture Source Pixabay